Merge branch 'staging' into 'production'
Staging to production for dg105 See merge request cccb/www!15
This commit is contained in:
commit
b7651631ad
|
@ -13,7 +13,7 @@ event:
|
||||||
location: CCCB
|
location: CCCB
|
||||||
language: de
|
language: de
|
||||||
streaming: true
|
streaming: true
|
||||||
recording: http://streaming.media.ccc.de/datengarten
|
recording: https://media.ccc.de/v/dg-104
|
||||||
---
|
---
|
||||||
Ein EKG fuer alle Teilnehmer\*innen des Chaos Communication Camps: Diese
|
Ein EKG fuer alle Teilnehmer\*innen des Chaos Communication Camps: Diese
|
||||||
einfache Idee brachte das card10 Badge hervor. Ein Badge, das in Form
|
einfache Idee brachte das card10 Badge hervor. Ein Badge, das in Form
|
||||||
|
|
18
content/datengarten/105.md
Normal file
18
content/datengarten/105.md
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
---
|
||||||
|
categories: ["Datengarten"]
|
||||||
|
tags: ["card10", "badge", "camp2019"]
|
||||||
|
series: "Datengarten"
|
||||||
|
title: "Datengarten 104"
|
||||||
|
no: 104
|
||||||
|
subtitle: "IT-Security Weaknesses of Emergency Alert Apps"
|
||||||
|
speaker: "Malte Schoenefeld, Marc Schoenefeld"
|
||||||
|
date: 2019-12-04T16:23:00+02:00
|
||||||
|
event:
|
||||||
|
start: 2019-12-10T20:00:00+02:00
|
||||||
|
end: 2019-12-10T21:00:00+02:00
|
||||||
|
location: CCCB
|
||||||
|
language: en
|
||||||
|
streaming: false
|
||||||
|
#recording: https://streaming.media.ccc.de/datengarten
|
||||||
|
---
|
||||||
|
Emergency Apps (like NINA/DE, FEMA/US and others) are a novel approach to enhance conventioal emergency alert channels with mobile devices, which nowadays are owned by the majority of the population to connect them to omnipresent data sources of the Internet. Due to typical characteristics implied by the design of mobile operating systems and applications, emergency apps on the hand have short version life cycles, on the other hand should be resilient to human and technical failure. Therefore we present the features of mobile apps, describe typical requirements towards these. To provide a practical result we scanned several apps for typical vulnerability patterns (and placed these in the CVE/CWE categories). In the end we summarize our research results towards a wish list to promote standard infrastructure and quality criteria for the development and deployment of such apps.
|
|
@ -7,7 +7,7 @@ menu:
|
||||||
parent: "verein"
|
parent: "verein"
|
||||||
---
|
---
|
||||||
|
|
||||||
_Stand: 17. März 2009_
|
_Stand: 17. März 2019_
|
||||||
|
|
||||||
## Präambel
|
## Präambel
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue